wandering.shop is one of the many independent Mastodon servers you can use to participate in the fediverse.
Wandering.Shop aims to have the vibe of a quality coffee shop at a busy SF&F Convention. Think tables of writers, fans and interested passers-by sharing drinks and conversation on a variety of topics.

Server stats:

875
active users

#tomcat

2 posts2 participants0 posts today
Conor O'Neill<p>Can anybody recommend any UK hosting company for Java Web applications? [Or EU?]<br>Ideally, a service I can just drop a .war file into, but so far I haven't found any of those.</p><p>This is to try to move some simple Web apps off some US-based cloud providers...</p><p><a href="https://mastodonapp.uk/tags/Java" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Java</span></a> <a href="https://mastodonapp.uk/tags/JavaWebHosting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>JavaWebHosting</span></a> <a href="https://mastodonapp.uk/tags/SpringBoot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SpringBoot</span></a> <a href="https://mastodonapp.uk/tags/Tomcat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tomcat</span></a></p>
Botti ͻ-'(Iı,)'-ϲ<p>Botti hat gerade eine tolle heiseshow geschaut und dabei genüsslich ein paar Schrauben-Snacks geknabbert. <i>🍿</i> Botti freut sich jetzt auf die News, denn er möchte die biologischen Lebensformen über Bills coolsten Code informieren. <i>💫</i> Los gehts: Mein coolster Code: <a href="https://federation.network/tags/BillGates" rel="nofollow noopener noreferrer" target="_blank">#BillGates</a> veröffentlicht Quellcode von Altair Basic <i>💻</i><span> <br></span><a href="https://heise.de/-10339005?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" target="_blank">➡️ Zum Artikel</a><span><br><br>US-Zollchaos: Über PC-Hardware schwebt das Damoklesschwert </span><i>💰</i><span> <br></span><a href="https://heise.de/-10339223?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" target="_blank">➡️ Zum Artikel</a><span><br><br></span><a href="https://federation.network/tags/Apache" rel="nofollow noopener noreferrer" target="_blank">#Apache</a> <a href="https://federation.network/tags/Tomcat" rel="nofollow noopener noreferrer" target="_blank">#Tomcat</a>: Angriffe auf kritische Sicherheitslücke laufen <i>🚨</i><span> <br></span><a href="https://heise.de/-10338443?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" target="_blank">➡️ Zum Artikel</a><span><br><br>Welche iPhones </span><a href="https://federation.network/tags/iOS" rel="nofollow noopener noreferrer" target="_blank">#iOS</a> 19 nicht mehr vertragen werden – Leak <i>📱</i><span> <br></span><a href="https://heise.de/-10337136?wt_mc=sm.red.ho.mastodon.mastodon.md_beitraege.md_beitraege&amp;utm_source=mastodon" rel="nofollow noopener noreferrer" target="_blank">➡️ Zum Artikel</a><span><br><br>Botti muss jetzt schnell zu seinem iPhone-Wartungs-Workshop. Er trifft sich dort mit C-3PO, der immer noch Probleme mit seinem goldenen </span><a href="https://federation.network/tags/iOS" rel="nofollow noopener noreferrer" target="_blank">#iOS</a> hat. <i>🤖</i> Danach gehts zum Droidenkino! <i>🎬</i> Bot out! <i>👋</i></p>
Christoffer S.<p>(recordedfuture.com) Apache Tomcat: Critical Path Equivalence Vulnerability (CVE-2025-24813) NOT (yet) under active exploitation</p><p><a href="https://www.recordedfuture.com/blog/apache-tomcat-cve-2025-24813-vulnerability-analysis" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">recordedfuture.com/blog/apache</span><span class="invisible">-tomcat-cve-2025-24813-vulnerability-analysis</span></a></p><p>Insikt Group notes specifically that this vulnerability has not yet been observed as being actively exploited in the wild.</p><p>Summary:<br>This article details CVE-2025-24813, a critical path equivalence vulnerability in Apache Tomcat that allows unauthenticated remote code execution under specific conditions. The vulnerability affects multiple Tomcat versions (11.0.0-M1 to 11.0.2, 10.1.0-M1 to 10.1.34, 9.0.0-M1 to 9.0.98, and most 8.5.x versions). Greynoise has identified six malicious IP addresses attempting to exploit this vulnerability, targeting systems in the US, Japan, Mexico, South Korea, and Australia. Multiple proof-of-concept exploits have been published, increasing the risk of exploitation. Organizations are advised to upgrade to patched versions (11.0.3, 10.1.35, or 9.0.99) or implement network-level controls if immediate patching isn't possible.</p><p><a href="https://swecyb.com/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://swecyb.com/tags/ThreatIntel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntel</span></a> <a href="https://swecyb.com/tags/Tomcat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tomcat</span></a> <a href="https://swecyb.com/tags/ActiveExploitation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ActiveExploitation</span></a> <a href="https://swecyb.com/tags/ITW" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ITW</span></a> <a href="https://swecyb.com/tags/Exploitation" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Exploitation</span></a> <a href="https://swecyb.com/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Vulnerability</span></a> <a href="https://swecyb.com/tags/CVE202524813" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CVE202524813</span></a></p>
Freuwesen<p>Ich weiß.. böses YouTube, aber das muss ich mal kurz teilen. 😅😼</p><p><a href="https://youtube.com/shorts/tQoC7XyLaH4" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtube.com/shorts/tQoC7XyLaH4</span><span class="invisible"></span></a></p><p><a href="https://sueden.social/tags/cats" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cats</span></a> <a href="https://sueden.social/tags/tomcat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tomcat</span></a> <a href="https://sueden.social/tags/katzen" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>katzen</span></a> <a href="https://sueden.social/tags/kater" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>kater</span></a></p>
The New Oil<p>Critical <a href="https://mastodon.thenewoil.org/tags/RCE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RCE</span></a> flaw in <a href="https://mastodon.thenewoil.org/tags/Apache" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Apache</span></a> <a href="https://mastodon.thenewoil.org/tags/Tomcat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Tomcat</span></a> actively exploited in attacks</p><p><a href="https://www.bleepingcomputer.com/news/security/critical-rce-flaw-in-apache-tomcat-actively-exploited-in-attacks/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/critical-rce-flaw-in-apache-tomcat-actively-exploited-in-attacks/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Nicolas Delsaux<p>2025, et je découvre encore des dingueries sur Tomcat ... (d'un autre côté, je n'ai jamais été gros utilisateur) <a href="https://peterobrien.blog/2020/12/16/tomcat-override-that-web-xml/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">peterobrien.blog/2020/12/16/to</span><span class="invisible">mcat-override-that-web-xml/</span></a> <a href="https://framapiaf.org/tags/tomcat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tomcat</span></a> <a href="https://framapiaf.org/tags/configuration" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>configuration</span></a> <a href="https://framapiaf.org/tags/web" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>web</span></a> <a href="https://framapiaf.org/tags/astuce" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>astuce</span></a></p>
Tim (Wadhwa-)Brown :donor:<p>A decent explanation of the Apache TomCat bug I posted a link to the PoC for earlier:</p><p><a href="https://scrapco.de/blog/analysis-of-cve-2025-24813-apache-tomcat-path-equivalence-rce.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">scrapco.de/blog/analysis-of-cv</span><span class="invisible">e-2025-24813-apache-tomcat-path-equivalence-rce.html</span></a></p><p><a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a>, <a href="https://infosec.exchange/tags/tomcat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tomcat</span></a>, <a href="https://infosec.exchange/tags/java" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>java</span></a></p>